HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128
URLs are surprisingly hard to read.
Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CVE #SecurityResearch
Видео HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128 канала LiveOverflow
Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CVE #SecurityResearch
Видео HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128 канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Identifying Good Research to actually Learn Something - Cross-site ScriptingThe Curse of Cross-Origin Stylesheets - Web Security ResearchNintendo Switch (NVIDIA Tegra X1) - BootROM Vulnerabilityprogrammers_are_evil() - Live at LinuxFest NW 2018Critical .zip vulnerabilities? - Zip Slip and ZipperDownBest Operating Systems for Hacking?!Reverse engineering obfuscated JavaScript - PopUnder Chrome 59STOP WASTING YOUR TIME AND LEARN MORE HACKING!Reverse Engineered old Compression Algorithm for FroggerWhat do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-throughMMORPG Bot Reverse Engineering and TrackingSolving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018XSS on Google Search - Sanitizing HTML in The Client?Some thoughts on Mobile App Security - is it FUD?Analysing a Firefox Malware browserassist.dll - FLARE-On 2018Fuzzing Browsers for weird XSS VectorsCustom Chromium Build to Reverse Engineer Pop-Under TrickDissecting Pokemon Red Savegame - GameBoy HaxGlobal variable Buffer Overflow to leak memory - 34C3 CTF readme_revenge (pwn)